-s -> enables silent mode, no error messages are displayed for command mode, -installkph and -uninstallkph
-ras -> enters run-as-service mode
-nokph -> disables KProcessHacker, Process Hacker will not attempt to load the driver or connect to it
-installkph -> installs KProcessHacker as a System Start service
-uninstallkph -> deletes the KProcessHacker service
-debug -> shows the debug console early in the startup process
-showoptions -hwnd parentwindow -point x,y -> displays the Advanced tab of the options window only. parentwindow specifies the parent window handle in hexadecimal and x,y specifies the location of the options window.
-phsvc -> enters phsvc mode which exposes a LPC-based API currently used by Process Hacker for tasks that require elevation.
-priority r|h|n|l -> sets the priority of Process Hacker to realtime (r), high (h), normal (n) or idle (l).
-selectpid pid -> selects pid in a new or existing instance of Process Hacker.
-sysinfo section -> opens the System Information window at startup, and optionally navigates to the specified section.
It has the following display:
Due to its side-loading vulnerability, this tool has been abused by other malware to kill security-related software by loading a stager DLL via DLL search order hijacking.
Minimum Scan Engine: 9.800
SSAPI PATTERN File: 2.373.00
SSAPI PATTERN Date: 27 Jan 2021
Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Scan your computer with your Trend Micro product to delete files detected as PUA.Win64.ProcHack.AC. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information: